<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>TraderTraitor Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/tradertraitor/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/tradertraitor/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Fri, 11 Jul 2025 07:14:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>TraderTraitor Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/tradertraitor/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Bybit Hack Aftermath: Greece Freezes Crypto Assets!</title>
		<link>https://coinengineer.net/blog/bybit-hack-aftermath-greece-freezes-crypto-assets/</link>
					<comments>https://coinengineer.net/blog/bybit-hack-aftermath-greece-freezes-crypto-assets/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Thu, 10 Jul 2025 11:13:47 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AML Greece]]></category>
		<category><![CDATA[blockchain analytics]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[CeFi security]]></category>
		<category><![CDATA[crypto asset seizure]]></category>
		<category><![CDATA[crypto freeze]]></category>
		<category><![CDATA[Crypto Regulation]]></category>
		<category><![CDATA[Crypto-laundering]]></category>
		<category><![CDATA[cybercrime fight]]></category>
		<category><![CDATA[DeFi TVL]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[North Korea cyberattack]]></category>
		<category><![CDATA[TraderTraitor]]></category>
		<category><![CDATA[TRM Labs]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=45851</guid>

					<description><![CDATA[<p>Greece officially froze crypto assets linked to the $1.46 billion Bybit hack that occurred in February 2025. This move marks the country’s first-ever asset freeze targeting cryptocurrencies. The Greek AML authority carried out the operation in collaboration with Chainalysis.  The Bybit hack was executed by Lazarus, a North Korea-linked cybercrime group. The FBI labeled the</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hack-aftermath-greece-freezes-crypto-assets/">Bybit Hack Aftermath: Greece Freezes Crypto Assets!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c><strong>Greece</strong> officially froze crypto assets linked to the <strong>$1.46 billion</strong> <a href="https://coinengineer.net/blog/bybit-recovers-7-market-share-after-1-4b-hack/"><strong>Bybit hack</strong></a> that occurred in February 2025. This move marks the country’s first-ever asset freeze targeting cryptocurrencies. The <strong>Greek AML</strong> authority carried out the operation in collaboration with Chainalysis.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>The Bybit hack was executed by <strong>Lazarus</strong>, a North Korea-linked cybercrime group. The FBI labeled the incident as the “<strong>TraderTraitor”</strong> operation. The stolen amount surpassed all North Korea-related cyber thefts in 2024.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Lazarus’s “Flood the Zone” Tactic Exposed</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>After the attack, <a href="https://coinengineer.net/blog/bybit-declares-war-on-lazarus-group/"><strong>Lazarus</strong></a> rapidly laundered the stolen funds through multidirectional, high-frequency transactions. This method, called “flood the zone” by TRM Labs, aims to overwhelm exchange compliance teams and <strong>blockchain analytics</strong> firms.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>TRM Labs stated, “This tactic involves intense, simultaneous transfers designed to drown regulators and analysts. The <strong>Bybit hack</strong> clearly showed an increased use of this method.” This reveals significant security gaps in the digital asset ecosystem.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Meanwhile, <strong>Chainalysis</strong> experts traced suspicious wallets linked to a local crypto exchange in Greece. As a result, the assets held by the exchange were frozen. This step underlines the critical role of international cooperation in fighting crypto crimes.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>A New Chapter in Global Crypto Regulation</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Greek Finance Minister Kyriakos Pierrakakis commented on the case:</span> <span data-c>“Thanks to blockchain’s traceability, international cooperation can stop financial crimes.”</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>This operation may inspire similar actions in countries like South Korea and the U.S. Centralized exchanges such as <strong>Bybit</strong> must strengthen security after such attacks. The rise in investments across <strong>DeFi and CeFi</strong> platforms makes this increasingly important. According to <a href="https://defillama.com/"><strong>DeFiLlama</strong></a>, the total value locked (TVL) reached <strong>$121 billion</strong> in July 2025.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>This development highlights cybersecurity as a top priority in crypto markets. Moreover, blockchain’s transparency enables more effective combat against cybercrime.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></span></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hack-aftermath-greece-freezes-crypto-assets/">Bybit Hack Aftermath: Greece Freezes Crypto Assets!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-hack-aftermath-greece-freezes-crypto-assets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T000247.642.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T000247.642.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>North Korean Hackers Target Crypto Devs with Fake Job Offers</title>
		<link>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/</link>
					<comments>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 17 Apr 2025 15:00:40 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[API theft]]></category>
		<category><![CDATA[crypto dev hack]]></category>
		<category><![CDATA[developer safety]]></category>
		<category><![CDATA[fake job offers]]></category>
		<category><![CDATA[GitHub attacks]]></category>
		<category><![CDATA[LinkedIn scam]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Slow Pisces]]></category>
		<category><![CDATA[TraderTraitor]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40403</guid>

					<description><![CDATA[<p>North Korean hacking groups are luring crypto developers with fake job offers and coding tests laced with malware, according to cybersecurity experts. Malware Hidden in &#8220;Coding Assignments&#8221; Hackers from the group Slow Pisces (aka Jade Sleet / TraderTraitor) approach developers on LinkedIn, offering dream gigs in DeFi or blockchain security. Once trust is built, they</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/">North Korean Hackers Target Crypto Devs with Fake Job Offers</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2409" data-end="2571"><strong data-start="2409" data-end="2440">North Korean hacking groups</strong> are luring <strong data-start="2452" data-end="2473">crypto developers</strong> with <strong data-start="2479" data-end="2515">fake job offers and coding tests</strong> laced with malware, according to cybersecurity experts.</p>
<h2 data-start="2573" data-end="2619">Malware Hidden in &#8220;Coding Assignments&#8221;</h2>
<p class="" data-start="2621" data-end="2972">Hackers from the group <strong data-start="2644" data-end="2692">Slow Pisces (aka Jade Sleet / TraderTraitor)</strong> approach developers on LinkedIn, offering dream gigs in <strong data-start="2749" data-end="2757">DeFi</strong> or <strong data-start="2761" data-end="2784">blockchain security</strong>. Once trust is built, they send malware-infected coding challenges hosted on GitHub. When opened, these files steal <strong data-start="2901" data-end="2913">SSH keys</strong>, <strong data-start="2915" data-end="2943">cloud access credentials</strong>, and <strong data-start="2949" data-end="2971">crypto wallet data</strong>.</p>
<hr />
<h4 data-start="1444" data-end="1471"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></h4>
<hr />
<h2 data-start="2974" data-end="3017">Using Freelance Platforms to Spread</h2>
<p class="" data-start="3019" data-end="3159">According to <strong data-start="3032" data-end="3042">Hacken</strong> and <strong data-start="3047" data-end="3057">Cyvers</strong>, platforms like <strong data-start="3074" data-end="3084">Upwork</strong> and <strong data-start="3089" data-end="3099">Fiverr</strong> are also being used by attackers posing as hiring managers.</p>
<p data-start="3019" data-end="3159"><em><span style="font-size: 14.4px;">“They create </span>credible profiles and fake resumes</em><span style="font-size: 14.4px;"><em> just to infiltrate Web3 firms via targeted developers,”</em> says </span>Hayato Shigekawa<span style="font-size: 14.4px;"> of </span>Chainalysis<span style="font-size: 14.4px;">.</span></p>
<h2 data-start="3318" data-end="3348">Security Tips for Devs</h2>
<ul>
<li data-start="3352" data-end="3420">Always use <strong data-start="3363" data-end="3396">virtual machines or sandboxes</strong> to test external code</li>
<li data-start="3423" data-end="3468"><strong data-start="3423" data-end="3444">Verify job offers</strong> via official channels</li>
<li data-start="3471" data-end="3510">Never store secrets in <strong data-start="3494" data-end="3508">plain text</strong></li>
<li data-start="3513" data-end="3579">Be wary of <strong data-start="3524" data-end="3547">unverified packages</strong> and unsolicited opportunities</li>
<li data-start="3582" data-end="3643">Implement <strong data-start="3592" data-end="3615">endpoint protection</strong> and <strong data-start="3620" data-end="3643">operational hygiene</strong></li>
</ul>
<p><em><span style="font-size: 14.4px;">“If it looks </span>too good to be true</em><span style="font-size: 14.4px;"><em>, it probably is,”</em> warns </span><strong style="font-size: 14.4px;" data-start="3708" data-end="3723">Luis Lubeck</strong><span style="font-size: 14.4px;"> of Hacken.</span></p>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/">North Korean Hackers Target Crypto Devs with Fake Job Offers</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>FBI Calls for Blocking Transactions Linked to Bybit Hack</title>
		<link>https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/</link>
					<comments>https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 16:00:02 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain analysis]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[financial crimes]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[TraderTraitor]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37479</guid>

					<description><![CDATA[<p>The U.S. Federal Bureau of Investigation (FBI) has called on crypto exchanges, node operators, and private sector entities to block transactions from addresses linked to the Bybit hack. FBI and Bybit Hack Investigation The FBI has confirmed that North Korea was behind the $1.4 billion Bybit hack on October 21. In a public service announcement</p>
<p>The post <a href="https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/">FBI Calls for Blocking Transactions Linked to Bybit Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="64" data-end="259">The <strong data-start="68" data-end="114">U.S. Federal Bureau of Investigation (FBI)</strong> has called on <strong data-start="129" data-end="256">crypto exchanges, node operators, and private sector entities to block transactions from addresses linked to the Bybit hack</strong>.</p>
<h2 data-start="261" data-end="303">FBI and Bybit Hack Investigation</h2>
<p data-start="305" data-end="510">The FBI has confirmed that <strong data-start="332" data-end="400">North Korea was behind the $1.4 billion Bybit hack on October 21</strong>. In a <strong data-start="407" data-end="453">public service announcement on February 26</strong>, the agency referred to the attack as “TraderTraitor.”</p>
<hr />
<p data-start="512" data-end="753"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="512" data-end="753">According to the FBI, <strong data-start="534" data-end="624">TraderTraitor is also known as Lazarus Group, APT38, BlueNoroff, and Stardust Chollima</strong>. The agency stated that the group had <strong data-start="663" data-end="750">rapidly converted some of the stolen assets into Bitcoin and other cryptocurrencies</strong>.</p>
<p data-start="512" data-end="753"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-149610 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/02/bybit.webp" alt="" width="1018" height="717" /></p>
<h2 data-start="755" data-end="804">Bybit Hack and Money Laundering Process</h2>
<p data-start="806" data-end="1040">The FBI revealed that <strong data-start="828" data-end="887">over 135,000 Ethereum (ETH) have already been laundered</strong>, with the attackers using <strong data-start="914" data-end="1011">decentralized exchanges, cross-chain bridges, and instant swap services with no KYC protocols</strong> to move the stolen assets.</p>
<p data-start="1042" data-end="1258">Additionally, <strong data-start="1056" data-end="1104">363,900 ETH (~$825 million) remain untouched</strong>. The FBI has shared <strong data-start="1125" data-end="1150">51 Ethereum addresses</strong> linked to the hackers and urged industry players to <strong data-start="1203" data-end="1255">block or avoid interactions with these addresses</strong>.</p>
<p data-start="1260" data-end="1496">Blockchain analytics firm <strong data-start="1286" data-end="1298">Elliptic</strong> has already flagged <strong data-start="1319" data-end="1381">11,084 crypto wallet addresses linked to the Bybit exploit</strong>. The FBI has called on anyone with relevant information to report it to the <strong data-start="1458" data-end="1493">Internet Crime Complaint Center</strong>.</p>
<hr />
<p data-start="1260" data-end="1496"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/">FBI Calls for Blocking Transactions Linked to Bybit Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/11/riot-platforms-1.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/11/riot-platforms-1.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
